encode.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454
  1. /* crypto/evp/encode.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include "cryptlib.h"
  60. #include <openssl/evp.h>
  61. static unsigned char conv_ascii2bin(unsigned char a);
  62. #ifndef CHARSET_EBCDIC
  63. # define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f])
  64. #else
  65. /*
  66. * We assume that PEM encoded files are EBCDIC files (i.e., printable text
  67. * files). Convert them here while decoding. When encoding, output is EBCDIC
  68. * (text) format again. (No need for conversion in the conv_bin2ascii macro,
  69. * as the underlying textstring data_bin2ascii[] is already EBCDIC)
  70. */
  71. # define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f])
  72. #endif
  73. /*-
  74. * 64 char lines
  75. * pad input with 0
  76. * left over chars are set to =
  77. * 1 byte => xx==
  78. * 2 bytes => xxx=
  79. * 3 bytes => xxxx
  80. */
  81. #define BIN_PER_LINE (64/4*3)
  82. #define CHUNKS_PER_LINE (64/4)
  83. #define CHAR_PER_LINE (64+1)
  84. static const unsigned char data_bin2ascii[65] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ\
  85. abcdefghijklmnopqrstuvwxyz0123456789+/";
  86. /*-
  87. * 0xF0 is a EOLN
  88. * 0xF1 is ignore but next needs to be 0xF0 (for \r\n processing).
  89. * 0xF2 is EOF
  90. * 0xE0 is ignore at start of line.
  91. * 0xFF is error
  92. */
  93. #define B64_EOLN 0xF0
  94. #define B64_CR 0xF1
  95. #define B64_EOF 0xF2
  96. #define B64_WS 0xE0
  97. #define B64_ERROR 0xFF
  98. #define B64_NOT_BASE64(a) (((a)|0x13) == 0xF3)
  99. #define B64_BASE64(a) !B64_NOT_BASE64(a)
  100. static const unsigned char data_ascii2bin[128] = {
  101. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  102. 0xFF, 0xE0, 0xF0, 0xFF, 0xFF, 0xF1, 0xFF, 0xFF,
  103. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  104. 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  105. 0xE0, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  106. 0xFF, 0xFF, 0xFF, 0x3E, 0xFF, 0xF2, 0xFF, 0x3F,
  107. 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A, 0x3B,
  108. 0x3C, 0x3D, 0xFF, 0xFF, 0xFF, 0x00, 0xFF, 0xFF,
  109. 0xFF, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06,
  110. 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E,
  111. 0x0F, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16,
  112. 0x17, 0x18, 0x19, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  113. 0xFF, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20,
  114. 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28,
  115. 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30,
  116. 0x31, 0x32, 0x33, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
  117. };
  118. #ifndef CHARSET_EBCDIC
  119. static unsigned char conv_ascii2bin(unsigned char a)
  120. {
  121. if (a & 0x80)
  122. return B64_ERROR;
  123. return data_ascii2bin[a];
  124. }
  125. #else
  126. static unsigned char conv_ascii2bin(unsigned char a)
  127. {
  128. a = os_toascii[a];
  129. if (a & 0x80)
  130. return B64_ERROR;
  131. return data_ascii2bin[a];
  132. }
  133. #endif
  134. void EVP_EncodeInit(EVP_ENCODE_CTX *ctx)
  135. {
  136. ctx->length = 48;
  137. ctx->num = 0;
  138. ctx->line_num = 0;
  139. }
  140. void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
  141. const unsigned char *in, int inl)
  142. {
  143. int i, j;
  144. unsigned int total = 0;
  145. *outl = 0;
  146. if (inl <= 0)
  147. return;
  148. OPENSSL_assert(ctx->length <= (int)sizeof(ctx->enc_data));
  149. if ((ctx->num + inl) < ctx->length) {
  150. memcpy(&(ctx->enc_data[ctx->num]), in, inl);
  151. ctx->num += inl;
  152. return;
  153. }
  154. if (ctx->num != 0) {
  155. i = ctx->length - ctx->num;
  156. memcpy(&(ctx->enc_data[ctx->num]), in, i);
  157. in += i;
  158. inl -= i;
  159. j = EVP_EncodeBlock(out, ctx->enc_data, ctx->length);
  160. ctx->num = 0;
  161. out += j;
  162. *(out++) = '\n';
  163. *out = '\0';
  164. total = j + 1;
  165. }
  166. while (inl >= ctx->length) {
  167. j = EVP_EncodeBlock(out, in, ctx->length);
  168. in += ctx->length;
  169. inl -= ctx->length;
  170. out += j;
  171. *(out++) = '\n';
  172. *out = '\0';
  173. total += j + 1;
  174. }
  175. if (inl != 0)
  176. memcpy(&(ctx->enc_data[0]), in, inl);
  177. ctx->num = inl;
  178. *outl = total;
  179. }
  180. void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl)
  181. {
  182. unsigned int ret = 0;
  183. if (ctx->num != 0) {
  184. ret = EVP_EncodeBlock(out, ctx->enc_data, ctx->num);
  185. out[ret++] = '\n';
  186. out[ret] = '\0';
  187. ctx->num = 0;
  188. }
  189. *outl = ret;
  190. }
  191. int EVP_EncodeBlock(unsigned char *t, const unsigned char *f, int dlen)
  192. {
  193. int i, ret = 0;
  194. unsigned long l;
  195. for (i = dlen; i > 0; i -= 3) {
  196. if (i >= 3) {
  197. l = (((unsigned long)f[0]) << 16L) |
  198. (((unsigned long)f[1]) << 8L) | f[2];
  199. *(t++) = conv_bin2ascii(l >> 18L);
  200. *(t++) = conv_bin2ascii(l >> 12L);
  201. *(t++) = conv_bin2ascii(l >> 6L);
  202. *(t++) = conv_bin2ascii(l);
  203. } else {
  204. l = ((unsigned long)f[0]) << 16L;
  205. if (i == 2)
  206. l |= ((unsigned long)f[1] << 8L);
  207. *(t++) = conv_bin2ascii(l >> 18L);
  208. *(t++) = conv_bin2ascii(l >> 12L);
  209. *(t++) = (i == 1) ? '=' : conv_bin2ascii(l >> 6L);
  210. *(t++) = '=';
  211. }
  212. ret += 4;
  213. f += 3;
  214. }
  215. *t = '\0';
  216. return (ret);
  217. }
  218. void EVP_DecodeInit(EVP_ENCODE_CTX *ctx)
  219. {
  220. /* Only ctx->num is used during decoding. */
  221. ctx->num = 0;
  222. ctx->length = 0;
  223. ctx->line_num = 0;
  224. ctx->expect_nl = 0;
  225. }
  226. /*-
  227. * -1 for error
  228. * 0 for last line
  229. * 1 for full line
  230. *
  231. * Note: even though EVP_DecodeUpdate attempts to detect and report end of
  232. * content, the context doesn't currently remember it and will accept more data
  233. * in the next call. Therefore, the caller is responsible for checking and
  234. * rejecting a 0 return value in the middle of content.
  235. *
  236. * Note: even though EVP_DecodeUpdate has historically tried to detect end of
  237. * content based on line length, this has never worked properly. Therefore,
  238. * we now return 0 when one of the following is true:
  239. * - Padding or B64_EOF was detected and the last block is complete.
  240. * - Input has zero-length.
  241. * -1 is returned if:
  242. * - Invalid characters are detected.
  243. * - There is extra trailing padding, or data after padding.
  244. * - B64_EOF is detected after an incomplete base64 block.
  245. */
  246. int EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl,
  247. const unsigned char *in, int inl)
  248. {
  249. int seof = 0, eof = 0, rv = -1, ret = 0, i, v, tmp, n, decoded_len;
  250. unsigned char *d;
  251. n = ctx->num;
  252. d = ctx->enc_data;
  253. if (n > 0 && d[n - 1] == '=') {
  254. eof++;
  255. if (n > 1 && d[n - 2] == '=')
  256. eof++;
  257. }
  258. /* Legacy behaviour: an empty input chunk signals end of input. */
  259. if (inl == 0) {
  260. rv = 0;
  261. goto end;
  262. }
  263. for (i = 0; i < inl; i++) {
  264. tmp = *(in++);
  265. v = conv_ascii2bin(tmp);
  266. if (v == B64_ERROR) {
  267. rv = -1;
  268. goto end;
  269. }
  270. if (tmp == '=') {
  271. eof++;
  272. } else if (eof > 0 && B64_BASE64(v)) {
  273. /* More data after padding. */
  274. rv = -1;
  275. goto end;
  276. }
  277. if (eof > 2) {
  278. rv = -1;
  279. goto end;
  280. }
  281. if (v == B64_EOF) {
  282. seof = 1;
  283. goto tail;
  284. }
  285. /* Only save valid base64 characters. */
  286. if (B64_BASE64(v)) {
  287. if (n >= 64) {
  288. /*
  289. * We increment n once per loop, and empty the buffer as soon as
  290. * we reach 64 characters, so this can only happen if someone's
  291. * manually messed with the ctx. Refuse to write any more data.
  292. */
  293. rv = -1;
  294. goto end;
  295. }
  296. OPENSSL_assert(n < (int)sizeof(ctx->enc_data));
  297. d[n++] = tmp;
  298. }
  299. if (n == 64) {
  300. decoded_len = EVP_DecodeBlock(out, d, n);
  301. n = 0;
  302. if (decoded_len < 0 || eof > decoded_len) {
  303. rv = -1;
  304. goto end;
  305. }
  306. ret += decoded_len - eof;
  307. out += decoded_len - eof;
  308. }
  309. }
  310. /*
  311. * Legacy behaviour: if the current line is a full base64-block (i.e., has
  312. * 0 mod 4 base64 characters), it is processed immediately. We keep this
  313. * behaviour as applications may not be calling EVP_DecodeFinal properly.
  314. */
  315. tail:
  316. if (n > 0) {
  317. if ((n & 3) == 0) {
  318. decoded_len = EVP_DecodeBlock(out, d, n);
  319. n = 0;
  320. if (decoded_len < 0 || eof > decoded_len) {
  321. rv = -1;
  322. goto end;
  323. }
  324. ret += (decoded_len - eof);
  325. } else if (seof) {
  326. /* EOF in the middle of a base64 block. */
  327. rv = -1;
  328. goto end;
  329. }
  330. }
  331. rv = seof || (n == 0 && eof) ? 0 : 1;
  332. end:
  333. /* Legacy behaviour. This should probably rather be zeroed on error. */
  334. *outl = ret;
  335. ctx->num = n;
  336. return (rv);
  337. }
  338. int EVP_DecodeBlock(unsigned char *t, const unsigned char *f, int n)
  339. {
  340. int i, ret = 0, a, b, c, d;
  341. unsigned long l;
  342. /* trim white space from the start of the line. */
  343. while ((conv_ascii2bin(*f) == B64_WS) && (n > 0)) {
  344. f++;
  345. n--;
  346. }
  347. /*
  348. * strip off stuff at the end of the line ascii2bin values B64_WS,
  349. * B64_EOLN, B64_EOLN and B64_EOF
  350. */
  351. while ((n > 3) && (B64_NOT_BASE64(conv_ascii2bin(f[n - 1]))))
  352. n--;
  353. if (n % 4 != 0)
  354. return (-1);
  355. for (i = 0; i < n; i += 4) {
  356. a = conv_ascii2bin(*(f++));
  357. b = conv_ascii2bin(*(f++));
  358. c = conv_ascii2bin(*(f++));
  359. d = conv_ascii2bin(*(f++));
  360. if ((a & 0x80) || (b & 0x80) || (c & 0x80) || (d & 0x80))
  361. return (-1);
  362. l = ((((unsigned long)a) << 18L) |
  363. (((unsigned long)b) << 12L) |
  364. (((unsigned long)c) << 6L) | (((unsigned long)d)));
  365. *(t++) = (unsigned char)(l >> 16L) & 0xff;
  366. *(t++) = (unsigned char)(l >> 8L) & 0xff;
  367. *(t++) = (unsigned char)(l) & 0xff;
  368. ret += 3;
  369. }
  370. return (ret);
  371. }
  372. int EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl)
  373. {
  374. int i;
  375. *outl = 0;
  376. if (ctx->num != 0) {
  377. i = EVP_DecodeBlock(out, ctx->enc_data, ctx->num);
  378. if (i < 0)
  379. return (-1);
  380. ctx->num = 0;
  381. *outl = i;
  382. return (1);
  383. } else
  384. return (1);
  385. }
  386. #ifdef undef
  387. int EVP_DecodeValid(unsigned char *buf, int len)
  388. {
  389. int i, num = 0, bad = 0;
  390. if (len == 0)
  391. return (-1);
  392. while (conv_ascii2bin(*buf) == B64_WS) {
  393. buf++;
  394. len--;
  395. if (len == 0)
  396. return (-1);
  397. }
  398. for (i = len; i >= 4; i -= 4) {
  399. if ((conv_ascii2bin(buf[0]) >= 0x40) ||
  400. (conv_ascii2bin(buf[1]) >= 0x40) ||
  401. (conv_ascii2bin(buf[2]) >= 0x40) ||
  402. (conv_ascii2bin(buf[3]) >= 0x40))
  403. return (-1);
  404. buf += 4;
  405. num += 1 + (buf[2] != '=') + (buf[3] != '=');
  406. }
  407. if ((i == 1) && (conv_ascii2bin(buf[0]) == B64_EOLN))
  408. return (num);
  409. if ((i == 2) && (conv_ascii2bin(buf[0]) == B64_EOLN) &&
  410. (conv_ascii2bin(buf[0]) == B64_EOLN))
  411. return (num);
  412. return (1);
  413. }
  414. #endif